US20070289012A1 - Remotely controllable security system - Google Patents
Remotely controllable security system Download PDFInfo
- Publication number
- US20070289012A1 US20070289012A1 US11/451,936 US45193606A US2007289012A1 US 20070289012 A1 US20070289012 A1 US 20070289012A1 US 45193606 A US45193606 A US 45193606A US 2007289012 A1 US2007289012 A1 US 2007289012A1
- Authority
- US
- United States
- Prior art keywords
- computing device
- mobile computing
- server
- security devices
- physical security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Definitions
- the present invention relates generally to the field of security systems and more particularly to a remotely controllable security system.
- a number security systems have been proposed for residences. These systems commonly have a number of sensors to detect intrusion or a fire and alert a central alarm monitoring station. At the central alarm monitoring station operator decides whether to immediately call the authorities, contact the owners or contact the owners' emergency contact. These systems are not well suited for businesses, since they commonly only monitor several set alarm conditions. In addition, the response times are limited since the operators at the central alarm monitoring station are not normally familiar with your business or residence. There are more complex security systems that have multiple cameras that have to be monitored by security personnel. These security personnel are expensive to hire and it is difficult for anyone to constantly monitor multiple monitors.
- a remotely controllable security system that overcomes these and other problems has a number of physical security devices, such as electronic door locks, closed circuit TV cameras, motion detectors, etc.
- Control and monitoring software running on a server is coupled to each of the physical security devices and monitors and stores events.
- streaming data can be saved and viewed from cameras and other devices.
- a mobile computing device is capable of communicating with the server or directly over a wireless channel to the physical security devices. The mobile computing device can view streaming data from the cameras.
- the mobile computing device has a cryptographic key for communicating with the server or with the physical security devices. When an alarm condition occurs, the mobile computing device is alerted and the user is present with a list of responses. The responses can include multiple actions, such as call the police and lock down all the doors. Because of the flexibility provided by the mobile computing device a central monitoring station or full time security personnel watching TV monitors is not required.
- FIG. 1 is a block diagram of a remotely controllable security system in accordance with one embodiment of the invention
- FIG. 2 is a block diagram of a remotely controllable security system in accordance with one embodiment of the invention.
- FIG. 3 is a graphical depiction of the physical security devices in accordance with one embodiment of the invention.
- FIG. 4 is a block diagram of the software running on a server in accordance with one embodiment of the invention.
- FIG. 5 is a block diagram of the software running on a mobile computing device in accordance with one embodiment of the invention.
- the invention is a remotely controllable security system that does not require a central alarm monitoring station and does not require expensive security personnel to watch camera monitors.
- the system has three main components: a number of physical security devices, a control and monitoring software running on a server and a mobile computing device.
- the physical security devices and the mobile computing device are capable of communicating over a wireless channel.
- the physical security devices are electrically connected to wireless access points and can receive communications from the mobile computing device directly without going through the server.
- FIG. 1 is a block diagram of a remotely controllable security system 10 in accordance with one embodiment of the invention.
- the system 10 includes a server 12 that runs a control and monitoring software.
- a personal digital assistant (PDA) 14 has a communication channel 16 to the server 12 .
- a plurality of physical security devices 18 , 20 , 22 , 24 , 26 , 28 are in communication with the server 12 and may also communicate directly with the PDA 14 .
- the physical security devices include a controllable door lock and keypad 18 , a door lock with proximity badge reader 20 , a camera 22 , a motion detector 24 , a RFID (radio frequency identification) reader 26 and other devices 28 .
- the physical security devices can communicated over communication channels 30 , 32 , 34 , 36 , 38 , 40 , 42 , 44 to the server 12 or the PDA 14 .
- the communication channels can be wired, wireless or both.
- the other devices 28 may include condition detectors, such as those detecting when a window is opened or broken.
- the monitoring and control software monitors all the physical security devices and keeps a record of all events related to each of the physical security devices. This includes recording video from the camera(s) 22 .
- the monitoring and control software also controls these devices by sending a list of valid codes to the door lock keypad 18 .
- the software also adds and removes authorized users from lists stored in the proximity badge reader 20 , RFID readers 26 , barcode reader, etc.
- the control software can cause the cameras to move, zoom and turn on or off.
- the control software may also lock down doors by refusing to open any doors until further notice.
- the server many also provide a user interface through the web that allows users to view and control all the devices.
- the mobile computing device may be a PDA, smart phone, laptop, etc.
- the mobile computing device runs a web browser which can be used to control the server or special client software can be used to control the server.
- the server can be used to setup connections between the mobile computing device and the physical computing devices, including streaming video from the camera to the mobile computing device.
- FIG. 2 is a block diagram of a remotely controllable security system 50 in accordance with one embodiment of the invention.
- the system 50 has a server 52 that runs a control and monitoring software 54 .
- the server 52 has a communication channel 56 to a plurality of physical security devices (PSD) 58 , 60 , 62 .
- PSD physical security devices
- the physical security devices 58 , 60 , 62 each have a wireless interface (WI) 64 , 66 , 68 in one embodiment.
- the server 52 also has a communication channel to a mobile computing device 70 .
- the mobile computing device has a cryptographic key 72 , which is necessary to communicate with the server 52 .
- the server 52 will also have a cryptographic key for secure communication.
- the mobile computing device 70 includes a wireless interface (WI) 74 .
- WI wireless interface
- the WI 74 allows the mobile computing device to communicate directly with the PSDs 58 , 60 , 62 or to communicate through the a plurality of wireless access points (WAP) 76 , 78 , 80 .
- the wireless access points 76 , 78 , 80 are hard wired to the server 52 although it is possible that they could communicate wirelessly with the server 52 .
- the WAPs 76 , 78 , 80 are also hard wired to the PSDs 58 , 60 , 62 either directly or through the server 52 .
- the mobile computing device 70 communicates with the server 52 , which communicates with the PSDs 58 , 60 , 62 . However, the mobile computing device 70 can communicate directly with the PSDs 58 , 60 , 62 when the server is down or there is an emergency.
- the mobile computing device 70 runs a web browser that acts as a front end of the control and monitoring software 54 on the server 52 .
- the server 52 is designed to be controlled through any machine that has a browser and the appropriate encryption software.
- FIG. 3 is a graphical depiction of the physical security devices in accordance with one embodiment of the invention.
- the physical security devices include motion detectors 90 , controllable doors 92 , keypad access panels for doors 94 , biometric readers 96 , closed circuit cameras 98 and event sensors such as a window sensor 100 . Any combination of these and other physical security devices may be used to protect a building from outside intruders, unauthorized access by employees or former employees and for fire detection.
- FIG. 4 is a block diagram of the software running on a server in accordance with one embodiment of the invention.
- a cryptography or encryption software 110 controls access to all the other software functions related to the security system.
- the cryptographic system 110 is in communication with the monitoring system 112 .
- the monitoring module 112 logs events associated with each of the physical security devices. The log includes date, time, type of event and device.
- the monitoring module 112 may also log streaming data from a camera or other device. All events are logged for future analysis. The logging of events is used to determine unusual patterns of behavior by employees or contractors.
- the control module 114 manages the lists of valid codes for keypads and lists of valid biometrics. This is useful in denying access to former employees, employees that have been assigned to new projects and employees that have been demoted.
- the control module 114 also includes a list of authorized users for various devices, commands cameras to pan/zoom or turn to a new view.
- the control module controls door locks. This allows the control module to lock all doors in case of an unauthorized access. Alternatively, it allows the system to unlock all the doors in the case of a fire.
- the server also has a user interface 116 that allows web access by remote users.
- FIG. 5 is a block diagram of the software running on a mobile computing device in accordance with one embodiment of the invention.
- a web browser 120 is used to access most of the functions on the mobile computing device.
- the web browser 120 is coupled to a communication interface 122 for communication with external devices.
- the communication interface includes a cryptographic key and encryption system that is necessary, in some embodiments, to access the server or physical security devices.
- the communication interface 122 also includes a password access module, that requires the user to enter a password and/or provide a biometric parameter (fingerprint, handwriting recognition, etc) before the user is allowed access to the security system functions.
- the mobile computing device has a similar set of monitoring 124 and control 126 software modules.
- the monitoring module 124 is capable of receiving streaming data 128 from a camera or other physical security device.
- the monitoring module 124 may also receive alerts 128 .
- the monitoring module 124 may receive an alert when an incorrect code is entered into a door keypad or when two incorrect key codes are entered consecutively.
- an alert may be received when the RFID reader data is inconsistent with the code entered into the door keypad. This may result in the control module 126 bring up a number of emergency options.
- These emergency options are preprogrammed into the mobile computing device.
- the emergency options may include a lock down feature where all the controllable locks are set to a lock condition. Another option may be to notify the police or the fire department. Alternatively, an alert may cause a camera's data to be streamed to the mobile computing device for evaluation.
- the mobile computing device may also receive an alert when a certain set of doors are opened or remain open for a period of time or when a motion detector(s) detects a certain group of motions. The user may be notified of the alert by the mobile computing device having an audible alarm or a vibration.
- the control module 126 may also have a number preset functions, such as night operation, weekend operation, vacation operation or high security operation, fire detected operations, intruder operations, etc.
- the control module 126 can change the memory of the physical security device by removing a newly-fired employee from the list of authorized PIN numbers in a keypad door lock. The control module 126 will store the change in its memory and upload the information to the server.
- the server when next available will poll the physical security devices for changes. If it notes a change it will record the change and alert other users of the change. This allows the users to immediately know if an attacker has used a mobile computing device in emergency mode to change the memory of these devices.
- the password module can also require a smart card or other device be inserted into the mobile computing device to authenticate the user.
- the mobile computing device can be controlled using voice recognition.
- the mobile computing device has the ability to implement macros to cause a series of actions to occur. An example is the lock down feature.
- the multiple WAP 76 , 78 , 80 may be used to triangulate (or use some other location algorithm) the location of mobile computing devices 70 .
- the RFID readers may also be used to determine the location of people or mobile computing devices. This information may be viewed by authorized personnel to locate all the devices or to determine the location of a mobile computing device that entered a bad password. In addition, the authorized personnel can locate employees nearest an alert event and communicate with them to investigate or take other action. Also by logging the location of the mobile computing devices and other events this information can be used to identify attackers on the security system.
Abstract
A remotely controllable security system has a number of physical security devices, such as electronic door locks, closed circuit TV cameras, motion detector, etc. Control and monitoring software running on a server is coupled to each of the physical security devices and monitors and stores events. In addition, streaming data can be saved and viewed from cameras and other devices. A mobile computing device is capable of communicating with the server or directly over a wireless channel to the physical security devices. The mobile computing device can view streaming data from the cameras.
Description
- None
- The present invention relates generally to the field of security systems and more particularly to a remotely controllable security system.
- A number security systems have been proposed for residences. These systems commonly have a number of sensors to detect intrusion or a fire and alert a central alarm monitoring station. At the central alarm monitoring station operator decides whether to immediately call the authorities, contact the owners or contact the owners' emergency contact. These systems are not well suited for businesses, since they commonly only monitor several set alarm conditions. In addition, the response times are limited since the operators at the central alarm monitoring station are not normally familiar with your business or residence. There are more complex security systems that have multiple cameras that have to be monitored by security personnel. These security personnel are expensive to hire and it is difficult for anyone to constantly monitor multiple monitors.
- Thus, there exists a need for a security system that does not require expensive security personnel or a central alarm monitoring station.
- A remotely controllable security system that overcomes these and other problems has a number of physical security devices, such as electronic door locks, closed circuit TV cameras, motion detectors, etc. Control and monitoring software running on a server is coupled to each of the physical security devices and monitors and stores events. In addition, streaming data can be saved and viewed from cameras and other devices. A mobile computing device is capable of communicating with the server or directly over a wireless channel to the physical security devices. The mobile computing device can view streaming data from the cameras. The mobile computing device has a cryptographic key for communicating with the server or with the physical security devices. When an alarm condition occurs, the mobile computing device is alerted and the user is present with a list of responses. The responses can include multiple actions, such as call the police and lock down all the doors. Because of the flexibility provided by the mobile computing device a central monitoring station or full time security personnel watching TV monitors is not required.
-
FIG. 1 is a block diagram of a remotely controllable security system in accordance with one embodiment of the invention; -
FIG. 2 is a block diagram of a remotely controllable security system in accordance with one embodiment of the invention; -
FIG. 3 is a graphical depiction of the physical security devices in accordance with one embodiment of the invention; -
FIG. 4 is a block diagram of the software running on a server in accordance with one embodiment of the invention; and -
FIG. 5 is a block diagram of the software running on a mobile computing device in accordance with one embodiment of the invention. - The invention is a remotely controllable security system that does not require a central alarm monitoring station and does not require expensive security personnel to watch camera monitors. The system has three main components: a number of physical security devices, a control and monitoring software running on a server and a mobile computing device. The physical security devices and the mobile computing device are capable of communicating over a wireless channel. In one embodiment, the physical security devices are electrically connected to wireless access points and can receive communications from the mobile computing device directly without going through the server.
-
FIG. 1 is a block diagram of a remotelycontrollable security system 10 in accordance with one embodiment of the invention. Thesystem 10 includes aserver 12 that runs a control and monitoring software. A personal digital assistant (PDA) 14 has acommunication channel 16 to theserver 12. A plurality ofphysical security devices server 12 and may also communicate directly with thePDA 14. The physical security devices include a controllable door lock andkeypad 18, a door lock withproximity badge reader 20, acamera 22, amotion detector 24, a RFID (radio frequency identification)reader 26 andother devices 28. The physical security devices can communicated overcommunication channels server 12 or thePDA 14. The communication channels can be wired, wireless or both. Theother devices 28 may include condition detectors, such as those detecting when a window is opened or broken. The monitoring and control software monitors all the physical security devices and keeps a record of all events related to each of the physical security devices. This includes recording video from the camera(s) 22. The monitoring and control software also controls these devices by sending a list of valid codes to thedoor lock keypad 18. The software also adds and removes authorized users from lists stored in theproximity badge reader 20,RFID readers 26, barcode reader, etc. The control software can cause the cameras to move, zoom and turn on or off. The control software may also lock down doors by refusing to open any doors until further notice. The server many also provide a user interface through the web that allows users to view and control all the devices. The mobile computing device may be a PDA, smart phone, laptop, etc. The mobile computing device runs a web browser which can be used to control the server or special client software can be used to control the server. The server can be used to setup connections between the mobile computing device and the physical computing devices, including streaming video from the camera to the mobile computing device. -
FIG. 2 is a block diagram of a remotelycontrollable security system 50 in accordance with one embodiment of the invention. Thesystem 50 has aserver 52 that runs a control and monitoringsoftware 54. Theserver 52 has a communication channel 56 to a plurality of physical security devices (PSD) 58, 60, 62. Thephysical security devices 58, 60, 62 each have a wireless interface (WI) 64, 66, 68 in one embodiment. Theserver 52 also has a communication channel to amobile computing device 70. The mobile computing device has a cryptographic key 72, which is necessary to communicate with theserver 52. Theserver 52 will also have a cryptographic key for secure communication. Themobile computing device 70 includes a wireless interface (WI) 74. The WI 74 allows the mobile computing device to communicate directly with thePSDs 58, 60, 62 or to communicate through the a plurality of wireless access points (WAP) 76, 78, 80. Thewireless access points server 52 although it is possible that they could communicate wirelessly with theserver 52. The WAPs 76, 78, 80 are also hard wired to thePSDs 58, 60, 62 either directly or through theserver 52. - Normally, the
mobile computing device 70 communicates with theserver 52, which communicates with thePSDs 58, 60, 62. However, themobile computing device 70 can communicate directly with thePSDs 58, 60, 62 when the server is down or there is an emergency. Themobile computing device 70 runs a web browser that acts as a front end of the control andmonitoring software 54 on theserver 52. Theserver 52 is designed to be controlled through any machine that has a browser and the appropriate encryption software. -
FIG. 3 is a graphical depiction of the physical security devices in accordance with one embodiment of the invention. The physical security devices includemotion detectors 90, controllable doors 92, keypad access panels fordoors 94,biometric readers 96, closedcircuit cameras 98 and event sensors such as a window sensor 100. Any combination of these and other physical security devices may be used to protect a building from outside intruders, unauthorized access by employees or former employees and for fire detection. -
FIG. 4 is a block diagram of the software running on a server in accordance with one embodiment of the invention. A cryptography or encryption software 110 controls access to all the other software functions related to the security system. The cryptographic system 110 is in communication with themonitoring system 112. Themonitoring module 112 logs events associated with each of the physical security devices. The log includes date, time, type of event and device. Themonitoring module 112 may also log streaming data from a camera or other device. All events are logged for future analysis. The logging of events is used to determine unusual patterns of behavior by employees or contractors. The control module 114 manages the lists of valid codes for keypads and lists of valid biometrics. This is useful in denying access to former employees, employees that have been assigned to new projects and employees that have been demoted. This function is accessible from the mobile computing device so that there is minimal lag time between the change in an employee's status and their access to sensitive areas of the building. The control module 114 also includes a list of authorized users for various devices, commands cameras to pan/zoom or turn to a new view. The control module controls door locks. This allows the control module to lock all doors in case of an unauthorized access. Alternatively, it allows the system to unlock all the doors in the case of a fire. The server also has auser interface 116 that allows web access by remote users. -
FIG. 5 is a block diagram of the software running on a mobile computing device in accordance with one embodiment of the invention. Aweb browser 120 is used to access most of the functions on the mobile computing device. Theweb browser 120 is coupled to a communication interface 122 for communication with external devices. The communication interface includes a cryptographic key and encryption system that is necessary, in some embodiments, to access the server or physical security devices. The communication interface 122 also includes a password access module, that requires the user to enter a password and/or provide a biometric parameter (fingerprint, handwriting recognition, etc) before the user is allowed access to the security system functions. The mobile computing device has a similar set ofmonitoring 124 andcontrol 126 software modules. Themonitoring module 124 is capable of receiving streaming data 128 from a camera or other physical security device. Themonitoring module 124 may also receive alerts 128. For instance, themonitoring module 124 may receive an alert when an incorrect code is entered into a door keypad or when two incorrect key codes are entered consecutively. Alternatively, an alert may be received when the RFID reader data is inconsistent with the code entered into the door keypad. This may result in thecontrol module 126 bring up a number of emergency options. These emergency options are preprogrammed into the mobile computing device. The emergency options may include a lock down feature where all the controllable locks are set to a lock condition. Another option may be to notify the police or the fire department. Alternatively, an alert may cause a camera's data to be streamed to the mobile computing device for evaluation. - The mobile computing device may also receive an alert when a certain set of doors are opened or remain open for a period of time or when a motion detector(s) detects a certain group of motions. The user may be notified of the alert by the mobile computing device having an audible alarm or a vibration. The
control module 126 may also have a number preset functions, such as night operation, weekend operation, vacation operation or high security operation, fire detected operations, intruder operations, etc. Thecontrol module 126 can change the memory of the physical security device by removing a newly-fired employee from the list of authorized PIN numbers in a keypad door lock. Thecontrol module 126 will store the change in its memory and upload the information to the server. If the mobile computing device is accidentally destroyed before communicating with the server, then the server when next available will poll the physical security devices for changes. If it notes a change it will record the change and alert other users of the change. This allows the users to immediately know if an attacker has used a mobile computing device in emergency mode to change the memory of these devices. The password module can also require a smart card or other device be inserted into the mobile computing device to authenticate the user. In one embodiment, the mobile computing device can be controlled using voice recognition. The mobile computing device has the ability to implement macros to cause a series of actions to occur. An example is the lock down feature. - In one embodiment, the
multiple WAP mobile computing devices 70. In one embodiment, the RFID readers may also be used to determine the location of people or mobile computing devices. This information may be viewed by authorized personnel to locate all the devices or to determine the location of a mobile computing device that entered a bad password. In addition, the authorized personnel can locate employees nearest an alert event and communicate with them to investigate or take other action. Also by logging the location of the mobile computing devices and other events this information can be used to identify attackers on the security system. - Thus there has been described a remotely controllable security that does not require expensive security personnel or a central alarm monitoring station.
- While the invention has been described in conjunction with specific embodiments thereof, it is evident that many alterations, modifications, and variations will be apparent to those skilled in the art in light of the foregoing description. Accordingly, it is intended to embrace all such alterations, modifications, and variations in the appended claims.
Claims (20)
1. A remotely controllable security system comprising:
a plurality of physical security devices each having a wireless interface;
a server coupled to each of the plurality of physical security devices having a control and monitoring software that tracks events related to each of the plurality of physical security devices; and
a mobile computing device having a wireless interface and capable of communicating directly with each of the plurality of physical security devices, the mobile computing device having a cryptographic key necessary for communicating with the server.
2. The system of claim 1 , wherein the plurality of physical security devices includes a keypad for a door and the server manages a list of authorized users.
3. The system of claim 1 , wherein the plurality of physical security devices include a controllable door lock and the mobile computing device includes a lock down feature.
4. The system of claim 1 , wherein the mobile computing device receives streaming data from one of the plurality of physical devices through the server.
5. The system of claim 1 , wherein the mobile computing device includes a list of emergency responses.
6. The system of claim 5 , wherein the list of emergency responses includes transmitting a message to at least one of the physical security devices to change its state.
7. The system of claim 1 , wherein the mobile computing device has a security software module that has a password access feature.
8. A remotely controllable security system, comprising:
a plurality of physical security devices at least one of which has a wireless interface;
a control and monitoring software tracking events related to each of the plurality of physical security devices; and
a mobile computing device having a wireless interface, the mobile computing device having a quick list of emergency responses.
9. The system of claim 8 , wherein the list of emergency responses includes a lock down feature.
10. The system of claim 9 , wherein the lock down feature includes directly transmitting a message to one of the physical security devices to change its state.
11. The system of claim 10 , wherein the mobile computing device has a cryptographic key necessary for communicating with the one of the physical security devices.
12. The system of claim 8 , wherein the mobile computing device receives a streaming data from one of the plurality of physical devices through the server.
13. The system of claim 11 , wherein the mobile computing device has a password access feature.
14. A remotely controllable security system comprising:
a plurality of physical devices;
a server coupled to the plurality of physical security devices;
a plurality of wireless access points; and
a mobile computing device that has a communication channel through one of the plurality of wireless access points to the server.
15. The system of claim 14 , wherein the server has a locate mobile computing device function that uses a signal between a subset of the plurality of wireless access points and the mobile computing device to locate the mobile computing device.
16. The system of claim 14 , wherein the mobile computing device receives an alert when an incorrect code is entered into one of the plurality of physical security devices.
17. The system of claim 14 , wherein the mobile computing device has a list of emergency responses.
18. The system of claim 17 , wherein the list of emergency responses includes a lock down feature.
19. The system of claim 18 , wherein the lock down feature transmits a message to one of the plurality of physical devices to change its state.
20. The system of claim 14 , wherein the mobile computing device has a cryptographic key necessary for communicating with the server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/451,936 US20070289012A1 (en) | 2006-06-13 | 2006-06-13 | Remotely controllable security system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/451,936 US20070289012A1 (en) | 2006-06-13 | 2006-06-13 | Remotely controllable security system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070289012A1 true US20070289012A1 (en) | 2007-12-13 |
Family
ID=38823479
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/451,936 Abandoned US20070289012A1 (en) | 2006-06-13 | 2006-06-13 | Remotely controllable security system |
Country Status (1)
Country | Link |
---|---|
US (1) | US20070289012A1 (en) |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070266428A1 (en) * | 2006-03-06 | 2007-11-15 | James Downes | Method, System, And Apparatus For Nested Security Access/Authentication |
US20080151050A1 (en) * | 2006-12-20 | 2008-06-26 | Self Michael R | Enhanced Multimedia Intrusion Notification System and Method |
US20090164467A1 (en) * | 2007-12-20 | 2009-06-25 | Nokia Corporation | Ice recognition function to override mobile device lock code |
US20090164519A1 (en) * | 2007-12-20 | 2009-06-25 | Nokia Corporation | Handling, management and creation of ice contacts |
US20090165511A1 (en) * | 2007-12-29 | 2009-07-02 | International Business Machines Corporation | Monitoring access to controlled areas using electronic monitors |
US20090300717A1 (en) * | 2008-06-03 | 2009-12-03 | Ca, Inc. | Hardware access and monitoring control |
US20100283579A1 (en) * | 2007-12-31 | 2010-11-11 | Schlage Lock Company | Method and system for remotely controlling access to an access point |
WO2012064263A1 (en) * | 2010-11-09 | 2012-05-18 | Zaplox Ab | Method and system for remote operation of an installation |
WO2012116037A1 (en) * | 2011-02-22 | 2012-08-30 | Stanley Security Solutions, Inc. | Wireless lock with lockdown |
US20120306613A1 (en) * | 2011-06-02 | 2012-12-06 | Nokia Siemens Networks Oy | Sensor allocation |
US20130008213A1 (en) * | 2008-06-27 | 2013-01-10 | Schlage Lock Company Llc | Electronic door with key-in-lever feature |
US8836790B1 (en) * | 2013-05-09 | 2014-09-16 | Remote Monitoring Systems, LLC | Remote monitoring system for tanks |
US20150187151A1 (en) * | 2012-07-27 | 2015-07-02 | Assa Abloy Ab | Systems and methods for controlling in-room safes with nfc-enabled devices |
US20150207971A1 (en) * | 2014-01-22 | 2015-07-23 | Panasonic Intellectual Property Management Co., Ltd. | Monitoring apparatus for controlling operation of shutter |
CN104932284A (en) * | 2014-02-06 | 2015-09-23 | 霍尼韦尔国际公司 | Method and system of interacting with building security systems |
WO2016095623A1 (en) * | 2014-12-19 | 2016-06-23 | 小米科技有限责任公司 | Method and apparatus for processing surveillance video |
US9538380B2 (en) * | 2015-06-03 | 2017-01-03 | I-Ting Shen | Control system cooperating with a mobile device and a management server |
US20170011573A1 (en) * | 2015-07-06 | 2017-01-12 | Acsys Ip Holding Inc. | Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons |
US9552491B1 (en) * | 2007-12-04 | 2017-01-24 | Crimson Corporation | Systems and methods for securing data |
US9589404B2 (en) * | 2015-06-05 | 2017-03-07 | Ford Global Technologies, Llc | Method and apparatus for remote vehicle keypad enablement and disablement |
US20170078260A1 (en) * | 2015-09-11 | 2017-03-16 | I-Ting Shen | Control System Operable by Mobile Devices |
FR3043118A1 (en) * | 2015-10-29 | 2017-05-05 | K Line | SYSTEM FOR STEERING A DOOR HAVING A CREMONE LOCK COMMANDABLE BY AN ELECTRIC ACTUATOR |
US9754432B2 (en) * | 2015-11-17 | 2017-09-05 | International Business Machines Corporation | Wireless communication protocol based lock management |
WO2017172871A1 (en) * | 2016-03-31 | 2017-10-05 | Spectrum Brands, Inc. | Locking device with multiple authentication devices |
US10606290B2 (en) | 2012-07-27 | 2020-03-31 | Assa Abloy Ab | Controlling an operating condition of a thermostat |
US11079755B2 (en) | 2019-04-05 | 2021-08-03 | Equipmentshare.Com Inc. | System and method for autonomous operation of a machine |
US11127410B2 (en) * | 2019-11-12 | 2021-09-21 | Wen-Ta Chiu | Voice decoding device and method thereof |
US20210343098A1 (en) * | 2016-09-21 | 2021-11-04 | Equipmentshare.Com Inc | Method, system and apparatus for equipment monitoring and access control |
US20220392285A1 (en) * | 2021-06-08 | 2022-12-08 | Carrier Corporation | Monitoring items in an area accessible through an electronic locking device |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5321242A (en) * | 1991-12-09 | 1994-06-14 | Brinks, Incorporated | Apparatus and method for controlled access to a secured location |
US6075860A (en) * | 1997-02-19 | 2000-06-13 | 3Com Corporation | Apparatus and method for authentication and encryption of a remote terminal over a wireless link |
US6559769B2 (en) * | 2001-10-01 | 2003-05-06 | Eric Anthony | Early warning real-time security system |
US20050237187A1 (en) * | 2004-04-09 | 2005-10-27 | Martin Sharon A H | Real-time security alert & connectivity system for real-time capable wireless cellphones and palm/hand-held wireless apparatus |
US6970183B1 (en) * | 2000-06-14 | 2005-11-29 | E-Watch, Inc. | Multimedia surveillance and monitoring system including network configuration |
US20060104600A1 (en) * | 2004-11-12 | 2006-05-18 | Sfx Entertainment, Inc. | Live concert/event video system and method |
US7113090B1 (en) * | 2001-04-24 | 2006-09-26 | Alarm.Com Incorporated | System and method for connecting security systems to a wireless device |
US20060250578A1 (en) * | 2005-05-06 | 2006-11-09 | Pohl Garrick G | Systems and methods for controlling, monitoring, and using remote applications |
US7183907B2 (en) * | 2004-10-20 | 2007-02-27 | Honeywell International, Inc. | Central station monitoring with real-time status and control |
US7218930B2 (en) * | 2003-07-31 | 2007-05-15 | Acer Incorporated | Automatic recognition system for use in a wireless local area network (LAN) |
-
2006
- 2006-06-13 US US11/451,936 patent/US20070289012A1/en not_active Abandoned
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5321242A (en) * | 1991-12-09 | 1994-06-14 | Brinks, Incorporated | Apparatus and method for controlled access to a secured location |
US6075860A (en) * | 1997-02-19 | 2000-06-13 | 3Com Corporation | Apparatus and method for authentication and encryption of a remote terminal over a wireless link |
US6970183B1 (en) * | 2000-06-14 | 2005-11-29 | E-Watch, Inc. | Multimedia surveillance and monitoring system including network configuration |
US7113090B1 (en) * | 2001-04-24 | 2006-09-26 | Alarm.Com Incorporated | System and method for connecting security systems to a wireless device |
US6559769B2 (en) * | 2001-10-01 | 2003-05-06 | Eric Anthony | Early warning real-time security system |
US7218930B2 (en) * | 2003-07-31 | 2007-05-15 | Acer Incorporated | Automatic recognition system for use in a wireless local area network (LAN) |
US20050237187A1 (en) * | 2004-04-09 | 2005-10-27 | Martin Sharon A H | Real-time security alert & connectivity system for real-time capable wireless cellphones and palm/hand-held wireless apparatus |
US7183907B2 (en) * | 2004-10-20 | 2007-02-27 | Honeywell International, Inc. | Central station monitoring with real-time status and control |
US20060104600A1 (en) * | 2004-11-12 | 2006-05-18 | Sfx Entertainment, Inc. | Live concert/event video system and method |
US20060250578A1 (en) * | 2005-05-06 | 2006-11-09 | Pohl Garrick G | Systems and methods for controlling, monitoring, and using remote applications |
Cited By (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070266428A1 (en) * | 2006-03-06 | 2007-11-15 | James Downes | Method, System, And Apparatus For Nested Security Access/Authentication |
US20080151050A1 (en) * | 2006-12-20 | 2008-06-26 | Self Michael R | Enhanced Multimedia Intrusion Notification System and Method |
US9552491B1 (en) * | 2007-12-04 | 2017-01-24 | Crimson Corporation | Systems and methods for securing data |
US20090164467A1 (en) * | 2007-12-20 | 2009-06-25 | Nokia Corporation | Ice recognition function to override mobile device lock code |
US20090164519A1 (en) * | 2007-12-20 | 2009-06-25 | Nokia Corporation | Handling, management and creation of ice contacts |
US8775430B2 (en) | 2007-12-20 | 2014-07-08 | Core Wireless Licensing S.A.R.L. | Handling, management and creation of ice contacts |
US8301630B2 (en) | 2007-12-20 | 2012-10-30 | Core Wireless Licensing S.A.R.L. | Handling, management and creation of ice contacts |
US20090165511A1 (en) * | 2007-12-29 | 2009-07-02 | International Business Machines Corporation | Monitoring access to controlled areas using electronic monitors |
US7994925B2 (en) * | 2007-12-29 | 2011-08-09 | International Business Machines Corporation | Monitoring access to controlled areas using electronic monitors |
US8331544B2 (en) * | 2007-12-31 | 2012-12-11 | Schlage Lock Company, Llc | Method and system for remotely controlling access to an access point |
US20100283579A1 (en) * | 2007-12-31 | 2010-11-11 | Schlage Lock Company | Method and system for remotely controlling access to an access point |
US20090300717A1 (en) * | 2008-06-03 | 2009-12-03 | Ca, Inc. | Hardware access and monitoring control |
US8341729B2 (en) * | 2008-06-03 | 2012-12-25 | Ca, Inc. | Hardware access and monitoring control |
US8819858B2 (en) | 2008-06-03 | 2014-08-26 | Ca, Inc. | Hardware access and monitoring control |
US20210164263A1 (en) * | 2008-06-27 | 2021-06-03 | Schlage Lock Company Llc | Electronic door with key-in-lever feature |
US20130008213A1 (en) * | 2008-06-27 | 2013-01-10 | Schlage Lock Company Llc | Electronic door with key-in-lever feature |
US10801235B2 (en) | 2008-06-27 | 2020-10-13 | Schlage Lock Company Llc | Electronic door with key-in-lever feature |
US11739561B2 (en) * | 2008-06-27 | 2023-08-29 | Schlage Lock Company Llc | Electronic door with key-in-lever feature |
US20170241164A1 (en) * | 2008-06-27 | 2017-08-24 | Schlage Lock Company | Electronic door with key-in-lever feature |
WO2012064263A1 (en) * | 2010-11-09 | 2012-05-18 | Zaplox Ab | Method and system for remote operation of an installation |
US9083698B2 (en) | 2010-11-09 | 2015-07-14 | Zablox AB | Method and system for remote operation of an installation |
AU2017202802B2 (en) * | 2011-02-22 | 2019-02-14 | Dormakaba Usa Inc. | Wireless lock with lockdown |
WO2012116037A1 (en) * | 2011-02-22 | 2012-08-30 | Stanley Security Solutions, Inc. | Wireless lock with lockdown |
CN103547754A (en) * | 2011-02-22 | 2014-01-29 | 斯坦利安全解决方案股份有限公司 | Wireless lock with lockdown |
US20120306613A1 (en) * | 2011-06-02 | 2012-12-06 | Nokia Siemens Networks Oy | Sensor allocation |
US20150187151A1 (en) * | 2012-07-27 | 2015-07-02 | Assa Abloy Ab | Systems and methods for controlling in-room safes with nfc-enabled devices |
US10606290B2 (en) | 2012-07-27 | 2020-03-31 | Assa Abloy Ab | Controlling an operating condition of a thermostat |
US8836790B1 (en) * | 2013-05-09 | 2014-09-16 | Remote Monitoring Systems, LLC | Remote monitoring system for tanks |
US20150207971A1 (en) * | 2014-01-22 | 2015-07-23 | Panasonic Intellectual Property Management Co., Ltd. | Monitoring apparatus for controlling operation of shutter |
US9594290B2 (en) * | 2014-01-22 | 2017-03-14 | Panasonic Intellectual Property Management Co., Ltd. | Monitoring apparatus for controlling operation of shutter |
CN104932284A (en) * | 2014-02-06 | 2015-09-23 | 霍尼韦尔国际公司 | Method and system of interacting with building security systems |
WO2016095623A1 (en) * | 2014-12-19 | 2016-06-23 | 小米科技有限责任公司 | Method and apparatus for processing surveillance video |
US10193875B2 (en) | 2014-12-19 | 2019-01-29 | Xiaomi Inc. | Method and apparatus for controlling access to surveillance video |
US9621702B2 (en) * | 2015-06-03 | 2017-04-11 | I-Ting Shen | Control system cooperating with a mobile device |
US9538380B2 (en) * | 2015-06-03 | 2017-01-03 | I-Ting Shen | Control system cooperating with a mobile device and a management server |
US9589404B2 (en) * | 2015-06-05 | 2017-03-07 | Ford Global Technologies, Llc | Method and apparatus for remote vehicle keypad enablement and disablement |
US9852562B2 (en) * | 2015-07-06 | 2017-12-26 | Acsys Ip Holding, Inc. | Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons |
US20170011573A1 (en) * | 2015-07-06 | 2017-01-12 | Acsys Ip Holding Inc. | Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons |
US9641510B2 (en) * | 2015-09-11 | 2017-05-02 | I-Ting Shen | Control system operable by mobile devices |
US20170078260A1 (en) * | 2015-09-11 | 2017-03-16 | I-Ting Shen | Control System Operable by Mobile Devices |
FR3043118A1 (en) * | 2015-10-29 | 2017-05-05 | K Line | SYSTEM FOR STEERING A DOOR HAVING A CREMONE LOCK COMMANDABLE BY AN ELECTRIC ACTUATOR |
US9754432B2 (en) * | 2015-11-17 | 2017-09-05 | International Business Machines Corporation | Wireless communication protocol based lock management |
WO2017172871A1 (en) * | 2016-03-31 | 2017-10-05 | Spectrum Brands, Inc. | Locking device with multiple authentication devices |
US11580803B2 (en) | 2016-03-31 | 2023-02-14 | Spectrum Brands, Inc. | Locking device with multiple authentication devices |
US20210343098A1 (en) * | 2016-09-21 | 2021-11-04 | Equipmentshare.Com Inc | Method, system and apparatus for equipment monitoring and access control |
US20210343096A1 (en) * | 2016-09-21 | 2021-11-04 | Equipmentshare.Com Inc | Method, system and apparatus for equipment monitoring and access control |
US11651640B2 (en) * | 2016-09-21 | 2023-05-16 | Equipmentshare.Com Inc | Method, system and apparatus for equipment monitoring and access control |
US11651637B2 (en) | 2016-09-21 | 2023-05-16 | Equipmentshare.Com Inc | Method, system and apparatus for equipment monitoring and access control |
US11651639B2 (en) * | 2016-09-21 | 2023-05-16 | Equipmentshare.Com Inc | Method, system and apparatus for equipment monitoring and access control |
US11651641B2 (en) * | 2016-09-21 | 2023-05-16 | Equipmentshare.Com Inc | Method, system and apparatus for equipment monitoring and access control |
US11823515B2 (en) * | 2016-09-21 | 2023-11-21 | Equipmentshare.Com Inc | Method, system and apparatus for equipment monitoring and access control |
US11079755B2 (en) | 2019-04-05 | 2021-08-03 | Equipmentshare.Com Inc. | System and method for autonomous operation of a machine |
US11127410B2 (en) * | 2019-11-12 | 2021-09-21 | Wen-Ta Chiu | Voice decoding device and method thereof |
US20220392285A1 (en) * | 2021-06-08 | 2022-12-08 | Carrier Corporation | Monitoring items in an area accessible through an electronic locking device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20070289012A1 (en) | Remotely controllable security system | |
US9679455B2 (en) | Security monitoring with programmable mapping | |
US10706703B1 (en) | Service entrance alarm system and methods of using the same | |
US7741969B2 (en) | Door entry security device with electronic lock | |
US8937539B2 (en) | Method and apparatus for automatically disarming a security system | |
US20020099945A1 (en) | Door access control and key management system and the method thereof | |
US20110001812A1 (en) | Context-Aware Alarm System | |
JP6266184B1 (en) | Monitoring system | |
TWM527479U (en) | Intellectual entry system | |
US10748366B2 (en) | Mobile-based access control system with wireless access controller | |
US20130155242A1 (en) | Stand-Alone, Portable Video Alarm System | |
KR101091902B1 (en) | Apparatus for real-time monitoring and robbery prevention and method thereof | |
JP2009108575A (en) | Room entrance/exit control system | |
Gavaskar et al. | A novel design and implementation of IoT based real-time ATM surveillance and security system | |
US20240105035A1 (en) | Smart sensor device and early warning notification system and method | |
KR101523027B1 (en) | Intrusion detection system using mobile terminal | |
US20240119769A1 (en) | Multiple tamper detection techniques for secure access device | |
KR101942076B1 (en) | Security system for stored items using contactless type tag | |
TWI599991B (en) | Intelligent access control system | |
KR102437525B1 (en) | Integrated system for blocking leakage of core technology information | |
KR101063751B1 (en) | Biometrics-based Passenger Identification and Information Transmission System | |
KR100664648B1 (en) | Clint terminal apparatus for security management system via internet | |
Shruthi et al. | Locker Security System using Internet of Things | |
JP6919763B2 (en) | Wireless communication device and entry / exit management system | |
KR100958432B1 (en) | System and methodf for security management, storage medium recording that method program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BLUEWAVE SECURITY, INC., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BIARD, LEEMON;REEL/FRAME:018203/0410 Effective date: 20060607 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |